This script allows interaction with a CVE-2017-7921 vulnerable camera to perform the following operations:
- Download and decrypt a configuration file, containing the camera's admin's password.
- Continuously download images every second.
- Convert a series of downloaded images into a video.
- Python 3.x
- Packages listed in
requirements.txt
. Install with:
pip install -r requirements.txt
The script takes the following arguments:
-p IP:PORT
: To download and decrypt the configuration file.-s IP:PORT
: To download images every second. Images are saved in thesnapshots/IP:PORT/
folder.-c IP:PORT
: Converts images from the specified camera into a video.-t
: Uses Tor for all requests. Ensure you have Tor service running.
Usage examples:
python script.py -p 192.168.1.10:8080
python script.py -s 192.168.1.10:8080 -t
python script.py -c 192.168.1.10:8080
Image download can be stopped by pressing Ctrl+C
.
Also image downloading does a check if the downloaded image is very similar to the previous one to avoid saving the same image multiple times.
Ensure you have permission to interact with the surveillance camera. Misuse of this script can be illegal and ethically wrong. Use responsibly.